Computer Tutorials and Books
Tutorials: C / C++ | C#.NET | PHP MySQL | Java | Java Script | jQuery | HTML | xHTML | HTML5 | VB Script | CSS

Books: C/C++ | C# | Android | Mathematics | Database | Cloud | Graphics | Networking | Oracle | Hardware | AI
Categories Free Downloadable Cryptography and Security eBooks! Bookmark and Share
Visual Cryptography and Its Applications
As technology progresses and as more and more personal data is digitized, there is even more of an emphasis required on data security today than there has ever been. Protecting this data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting problem. Many attempts have been made to solve this problem within the cryptographic community.

In this book, one of these data security methods known as visual cryptography (VC) is presented. Specifically, visual cryptography allows effective and efficient secret sharing between a number of trusted parties.
Practical Cryptography With Go
This is an introduction to cryptography for programmers; it doesn�t aim to teach the theory, but rather to guide you in your attempt to understand how to use cryptography to secure your services. We�ll talk about where it fits into the big picture, and illustrate it using The Go Programming Language. Some of the things we�ll discuss are symmetric, asymmetric, and hybrid cryptography, message authentication codes, trust, and how to engineer these systems properly to mitigate risk.
The Foundations of Cryptographys
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations.

Cryptography: An Introduction, 3rd Edition
This book provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
Forensic Discovery
Computer forensics - the art and science of gathering and analyzing digital evidence, reconstructing data and attacks, and tracking perpetrators - is becoming ever more important as IT and law enforcement professionals face an epidemic in computer crime. In Forensic Discovery, two internationally recognized experts present a thorough and realistic guide to the subject.

Theory and Practice of Cryptography and Network Security Protocols and Technologies
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information.

Juniper SRX Series: A Comprehensive Guide to Security Services on the SRX Series
This complete field guide, authorized by Juniper Networks, is the perfect hands-on reference for deploying, configuring, and operating Juniper�s SRX Series networking device. Authors Brad Woodberg and Rob Cameron provide field-tested best practices for getting the most out of SRX deployments, based on their extensive field experience.

Cryptography and Security in Computing
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms.
Recent Advances in Steganography
Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet.

Identity Management on a Shoestring
This document is aimed at Security and IT practitioners (especially architects) in end-user organisations who are responsible for implementing an enterprise-wide Identity and Access Management (IAM) system. It is neither a conceptual treatment of Identity (for which we would refer the reader to Kim Cameron's excellent work on the Laws of Identity) nor a detailed technical manual on a particular product.
Web Application Security Guide
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

Pages: 1 | 2

Home - Advertise - Contact - Disclaimer - About Us
© Since 2006 -- All Rights Reserved.